Legal & Professional Services
Revenue

Revenue





Risk Reduction

Risk Reduction





Productivity

Productivity





Tendant’s agreements expressly state that we are hired by our law firm subscribers as their communications agent, ensuring that any direct or inadvertent disclosures are protected by the attorney-client privilege doctrine.
“A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” Unlike consumer messaging apps, there is minimal risk to attorneys of violating this rule as Tendant’s protocols are designed with this requirement in mind.
ABA MODEL RULES OF PROFESSIONAL CONDUCT RULE 1.6(a) (2016)
Any organization that requires its employees to use their own personal devices for business risks violating that employee’s privacy every time they are required to disclose their personal cell phone number. Tendant avoids this risk by issuing each Tendant subscriber a separate business-owned, employee-managed cell number.
Client-contract information is constantly compromised every time a messaging app requests permission to access contact lists. This allows the provider to import contacts into the app’s domain, even after the app is uninstalled. Tendant provides controls allowing administrators to restrict access to personal phone contacts and data via the Tendant Control Panel protecting the firm’s contact lists from both spoliation and contact record leaks.
Many law firms use mobile device management (MDM) systems to ensure that smartphone data is remotely erased when an attorney separates from the firm or loses their device. This process can be indiscriminate and can be triggered by false indicators, erasing personal information along with business information. With Tendant, any documents received in our system are encrypted, and attachments cannot be detached to locations not allowed by the Tendant system administrator. Consequently, all a firm needs to do to ensure data are protected is to disable the user’s access to the application adding an extra layer of protection above the MDM system.